Skip to main content

Outsourced Privacy-Preserving Reduced SVM Among Multiple Institutions

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12453))

Abstract

Executing data mining algorithms locally is usually computationally intensive. A promising solution is to outsource the heavy data mining tasks and datasets. On the other hand, combining data from multiple institutions for a big and varied training set helps enhance the performance of data mining. Due to privacy concerns, different institutions should encrypt their datasets with different keys. Support Vector Machine (SVM) is a popular classifier. It is challenging to train SVM on encrypted datasets in the cloud. Existing schemes use either the multikey fully homomorphic encryption on one server, or partially homomorphic encryption on two non-colluding servers. The former is inefficient and the institutions have to remain online, while the latter relies too heavily on the assumption of two non-colluding servers. To remove these limitations, we demonstrate how to train SVM for both horizontally and vertically partitioned datasets. To reduce training complexity and enhance security, we focus on reduced SVM with a secure kernel matrix. We proved the security of our scheme and the experimental results validated its efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. LIBSVM: A library for support vector machines. https://www.csie.ntu.edu.tw/~cjlin/libsvm/. Accessed 15 Apr 2020

  2. Amirbekyan, A., Estivill-Castro, V.: A new efficient privacy-preserving scalar product protocol. In: Proceedings of the Sixth Australasian Conference on Data Mining and Analytics, vol. 70, pp. 209–214 (2007)

    Google Scholar 

  3. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Advances in Cryptology EUROCRYPT 1998, pp. 127–144 (1998)

    Google Scholar 

  4. Boneh, D., Goh, E.J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Theory of Cryptography Conference, pp. 325–341 (2005)

    Google Scholar 

  5. Demmler, D., Schneider, T., Zohner, M.: ABY-A framework for efficient mixed-protocol secure two-party computation. In: NDSS (2015)

    Google Scholar 

  6. Dennis Jr., J.E., Schnabel, R.B.: Numerical Methods for Unconstrained Optimization and Nonlinear Equations. SIAM, Philadelphia (1996)

    Google Scholar 

  7. Goldreich, O.: Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, New York (2004)

    Google Scholar 

  8. Hesamifard, E., Takabi, H., Ghasemi, M.: Deep neural networks classification over encrypted data. In: Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy (CODASPY 2019), pp. 97–108 (2019)

    Google Scholar 

  9. Laur, S., Lipmaa, H., Mielikäinen, T.: Cryptographically private support vector machines. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 618–624 (2006)

    Google Scholar 

  10. Lee, Y.J., Huang, S.Y.: Reduced support vector machines: A statistical theory. IEEE Trans. Neural Netw. 18(1), 1–13 (2007)

    Article  Google Scholar 

  11. Lee, Y.J., Mangasarian, O.L.: RSVM: Reduced support vector machines. In: Proceedings of the 2001 SIAM International Conference on Data Mining, pp. 1–17 (2001)

    Google Scholar 

  12. Lee, Y.J., Mangasarian, O.L.: Ssvm: A smooth support vector machine for classification. Comput. Optim. Appl. 20(1), 5–22 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  13. Li, X., Zhu, Y., Wang, J.: Secure Naïve Bayesian classification over encrypted data in cloud. In: Chen, L., Han, J. (eds.) ProvSec 2016. LNCS, vol. 10005, pp. 130–150. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47422-9_8

    Chapter  Google Scholar 

  14. Li, X., Zhu, Y., Wang, J., Liu, Z., Liu, Y., Zhang, M.: On the soundness and security of privacy-preserving SVM for outsourcing data classification. IEEE Trans. Dependable Secure Comput. 15(5), 906–912 (2018)

    Article  Google Scholar 

  15. Lin, K.-P., Chang, Y.-W., Chen, M.-S.: Secure support vector machines outsourcing with random linear transformation. Knowl. Inf. Syst. 44(1), 147–176 (2014). https://doi.org/10.1007/s10115-014-0751-1

    Article  Google Scholar 

  16. Lin, K.P., Chen, M.S.: Privacy-preserving outsourcing support vector machines with random transformation. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 363–372 (2010)

    Google Scholar 

  17. Lin, K.M., Lin, C.J.: A study on reduced support vector machines. IEEE Trans. Neural Netw. 14(6), 1449–1459 (2003)

    Article  Google Scholar 

  18. Liu, F., Ng, W.K., Zhang, W.: Encrypted SVM for outsourced data mining. In: EEE 8th International Conference on Cloud Computing, pp. 1085–1092 (2015)

    Google Scholar 

  19. Liu, F., Ng, W.K., Zhang, W.: Secure scalar product for big-data in mapreduce. In: IEEE International Conference on Big Data Computing Service and Applications (BigDataService), pp. 120–129 (2015)

    Google Scholar 

  20. Liu, L., Chen, R., Liu, X., Su, J., Qiao, L.: Towards practical privacy-preserving decision tree training and evaluation in the cloud. IEEE Trans. Inf. Forensics Secur. 15, 2914–2929 (2020)

    Article  Google Scholar 

  21. López-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing, pp. 1219–1234 (2012)

    Google Scholar 

  22. Ma, X., Zhang, F., Chen, X., Shen, J.: Privacy preserving multi-party computation delegation for deep learning in cloud computing. Inf. Sci. 459, 103–116 (2018)

    Article  MATH  Google Scholar 

  23. Maekawa, T., Kawamura, A., Kinoshita, Y., Kiya, H.: Privacy-preserving SVM computing in the encrypted domain. In: Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), pp. 897–902 (2018)

    Google Scholar 

  24. Mangasarian, O.L., Wild, E.W., Fung, G.M.: Privacy-preserving classification of vertically partitioned data via random kernels. ACM Trans. Knowl. Discovery Data (TKDD) 2(3), 12 (2008)

    Google Scholar 

  25. Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Boneh, D., Taft, N.: Privacy-preserving ridge regression on hundreds of millions of records. In: IEEE Symposium on Security and Privacy (SP), pp. 334–348 (2013)

    Google Scholar 

  26. Pedersen, T.B., Saygın, Y., Savaş, E.: Secret sharing vs. encryption-based techniques for privacy preserving data mining (2007)

    Google Scholar 

  27. Peter, A., Tews, E., Katzenbeisser, S.: Efficiently outsourcing multiparty computation under multiple keys. IEEE Trans. Inf. Forensics Secur. 8(12), 2046–2058 (2013)

    Article  Google Scholar 

  28. Qiu, S., Wang, B., Li, M., Liu, J., Shi, Y.: Toward practical privacy-preserving frequent itemset mining on encrypted cloud data. IEEE Trans. Cloud Comput. 8(1), 312–323 (2020)

    Article  Google Scholar 

  29. Vaidya, J., Yu, H., Jiang, X.: Privacy-preserving SVM classification. Knowl. Inf. Syst. 14(2), 161–178 (2008)

    Article  Google Scholar 

  30. Wang, B., Li, M., Chow, S.S., Li, H.: A tale of two clouds: Computing on data encrypted under multiple keys. In: 2014 IEEE Conference on Communications and Network Security (CNS), pp. 337–345 (2014)

    Google Scholar 

  31. Yu, A., Lai, W.L., Payor, J.: Efficient integer vector homomorphic encryption (2015). https://courses.csail.mit.edu/6.857/2015/files/yu-lai-payor.pdf

  32. Zhang, J., Wang, X., Yiu, S.M., Jiang, Z.L., Li, J.: Secure dot product of outsourced encrypted vectors and its application to SVM. In: Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, pp. 75–82 (2017)

    Google Scholar 

  33. Zou, Y., Zhao, Z., Shi, S., Wang, L., Peng, Y., Ping, Y., Wang, B.: Highly secure privacy-preserving outsourced k-means clustering under multiple keys in cloud computing. Secur. Commun. Netw. 2020, 1–11 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jun Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, J., Yiu, S.M., Jiang, Z.L. (2020). Outsourced Privacy-Preserving Reduced SVM Among Multiple Institutions. In: Qiu, M. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2020. Lecture Notes in Computer Science(), vol 12453. Springer, Cham. https://doi.org/10.1007/978-3-030-60239-0_9

Download citation

Publish with us

Policies and ethics